Skip to content
This repository has been archived by the owner on Jun 24, 2021. It is now read-only.

Keeping CertFP static regardless of LetsEncrypt renewal

Mikaela Suomalainen edited this page Jul 22, 2019 · 5 revisions

Set certfp_method = spki_sha512; or other beginning with spki_and check the new fingerprint with

$CHARYBDIS-INSTALL-PATH/bin/charybdis-mkfingerprint spki_sha512 $CHARYBDIS-INSTALL-PATH/etc/ssl/cert.pem 

and use the output as server fingerprint.

WARNING: This also affects user certfp's so users using certfp may not get identified automatically.

Alternative method to get the server SPKI is running gnutls-cli host:port, taking public-key-id and adjusting it into form SPKI:SHA2-256:...

WARNING: Certbot users be sure to run it with --reuse-key flag or it will generate entirely new keys changing the fingerprint. E.g. certbot renew --reuse-key You will also need to change the automagic command in /etc/cron.d/certbot and if you use systemd, ExecStart line of certbot.service. See systemctl show certbot.service | grep ExecStart and systemctl edit certbot.service

Clone this wiki locally